Which statement about a Fraggle attack is correct?

Enhance your knowledge as a Computer Hacking Forensic Investigator with the CHFI v11 Test. Use flashcards and multiple-choice questions, complete with hints and detailed explanations, to prepare effectively and ace your exam!

Multiple Choice

Which statement about a Fraggle attack is correct?

Explanation:
Fraggle is the UDP-based amplification attack. Like Smurf, it uses spoofed source addresses to trigger responses from a broadcast network, but it does so with UDP services rather than ICMP. An attacker sends a flood of UDP datagrams to a broadcast address targeting services such as UDP echo or chargen. Each host on the broadcast network replies to the spoofed source (the victim), producing a large volume of UDP responses directed at the victim. Because UDP is connectionless and lacks a handshake, spoofing the sender’s address is straightforward and the responses multiply, leading to the flood. This is why the statement that Fraggle uses UDP is the correct one. It’s not about ICMP, TCP, or HTTP—the mechanism relies on UDP-based reflection and amplification.

Fraggle is the UDP-based amplification attack. Like Smurf, it uses spoofed source addresses to trigger responses from a broadcast network, but it does so with UDP services rather than ICMP. An attacker sends a flood of UDP datagrams to a broadcast address targeting services such as UDP echo or chargen. Each host on the broadcast network replies to the spoofed source (the victim), producing a large volume of UDP responses directed at the victim. Because UDP is connectionless and lacks a handshake, spoofing the sender’s address is straightforward and the responses multiply, leading to the flood. This is why the statement that Fraggle uses UDP is the correct one. It’s not about ICMP, TCP, or HTTP—the mechanism relies on UDP-based reflection and amplification.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy